Vulnerability Name:

CVE-2021-43784 (CCN-214558)

Assigned:2021-11-09
Published:2021-11-09
Updated:2021-12-08
Summary:runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted configurations to run on their machines (such as with shared cloud infrastructure). runc version 1.0.3 contains a fix for this bug. As a workaround, one may try disallowing untrusted namespace paths from your container. It should be noted that untrusted namespace paths would allow the attacker to disable namespace protections entirely even in the absence of this bug.
CVSS v3 Severity:5.0 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)
4.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
6.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L)
5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.0 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-190
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2021-43784

Source: MISC
Type: Exploit, Third Party Advisory
https://bugs.chromium.org/p/project-zero/issues/detail?id=2241

Source: CCN
Type: Google Security Research Issue 2241
runc/libcontainer: insecure handling of bind mount sources

Source: XF
Type: UNKNOWN
opencontainers-cve202143784-sec-bypass(214558)

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed

Source: CCN
Type: runc GIT Repository
Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration

Source: CONFIRM
Type: Patch, Third Party Advisory
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f

Source: MLIST
Type: Vendor Advisory
[debian-lts-announce] 20211206 [SECURITY] [DLA 2841-1] runc security update

Source: CCN
Type: Packet Storm Security [12-06-2021]
runc / libcontainer Bind Mount Sources Insecure Handling

Source: CCN
Type: oss-sec Mailing List, Tue, 1 Nov 2011 21:43:04 -0400
CVE-2021-43784: integer overflow in runc's netlink bytemsg allows malicious configuration to discreetly modify container configuration

Source: CCN
Type: IBM Security Bulletin 6599703 (Db2 On Openshift)
Multiple vulnerabilities affect IBM Db2 On Openshift and IBM Db2 and Db2 Warehouse on Cloud Pak for Data

Source: CCN
Type: IBM Security Bulletin 6991561 (Edge Application Manager)
Open Source Dependency Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:linuxfoundation:runc:*:*:*:*:*:*:*:* (Version < 1.0.3)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:ibm:db2_warehouse:3.5:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2_warehouse:4.0:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:3.5:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:db2:4.0:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:7865
    P
    runc-1.1.5-150000.41.1 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:3249
    P
    libruby2_1-2_1-2.1.9-18.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:3798
    P
    syslog-service-2.0-778.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:3805
    P
    tftp-5.2-11.6.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:94879
    P
    runc-1.0.3-27.1 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:94714
    P
    libssh-config-0.9.6-150400.1.5 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:113414
    P
    runc-1.0.3-1.1 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:111184
    P
    Security update for runc (Moderate)
    2021-12-26
    oval:org.opensuse.security:def:99446
    P
    (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:93281
    P
    (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:100703
    P
    (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:101427
    P
    Security update for runc (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:94003
    P
    (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:42153
    P
    Security update for runc (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:99709
    P
    (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:64887
    P
    Security update for runc (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:111850
    P
    Security update for runc (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:117607
    P
    Security update for runc (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:93438
    P
    (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:101682
    P
    Security update for runc (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:103024
    P
    Security update for runc (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:94214
    P
    (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:42252
    P
    Security update for runc (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:100036
    P
    (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:64894
    P
    Security update for runc (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:93594
    P
    (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:990
    P
    Security update for runc (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:99176
    P
    (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:94425
    P
    (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:93120
    P
    (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:100370
    P
    (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:108093
    P
    Security update for runc (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:93788
    P
    (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:49126
    P
    Security update for runc (Moderate)
    2021-12-14
    oval:org.opensuse.security:def:20655
    P
    Security update for runc (Moderate)
    2021-12-14
    BACK
    linuxfoundation runc *
    debian debian linux 9.0
    ibm db2 warehouse 3.5 -
    ibm db2 warehouse 4.0 -
    ibm db2 3.5 -
    ibm db2 4.0 -